Q.1
How can you protect your PIN number at a cash machine from a criminal using "shoulder surfing"?
  • Cover your pin as you enter it
  • Use the cash machine in daylight
  • Get cash back from a shop
Q.2
True or false: Key-loggers remember keys used to find routes and gain information
  • True
  • False
Q.3
Stealing login information by watching someone else log in.
  • Phishing
  • Tailgating
  • Shoulder surfing
  • Quid pro quo
Q.4
Shouldering...
  • ...means looking over somebodies shoulder to see personal information
  • ...means framing as someone else to gain personal information
  • ...means using pop-up adverts to redirect users
  • ...means using threats to gain personal information
Q.5
You hack for fun, you cause no malicious damage. You may find a bug, but you won't report it. What type of "hat" hacker are you?
  • Black
  • Grey
  • White
  • Green
Q.6
This involves tempting someone with an offer which is hiding the true consequences.
  • Baiting
  • Quid Pro Quo
  • Tailgating
  • Shoulder Surfing
Q.7
An I.T. support technician might offer to remove a suspected virus, in return for remote access to your computer. They help initially, but the trick comes later. This is a form of....
  • Quid Pro Quo
  • Baiting
  • Pharming
  • Shoulder Surfing
Q.8
You hack to steal data and to cause disruption to the company. What type of "hat" hacker are you?
  • Black
  • Grey
  • White
  • Red
Q.9
The weakest point in a security system, is usually:
  • Poorly coded software
  • People
  • Unreliable hardware
  • Poor network connections
Q.10
What type of social engineering involves the criminal pretending to be a delivery person, and they need to be let into the building?
  • Piggybacking
  • Shoulder Surfing
  • Pretexting
  • Phishing
Q.11
What type of social engineering involves the attacker offering something, like a favour, in exchange for access to some personal information?
  • Quid Pro Quo
  • Pharming
  • Shoulder Surfing
  • Phishing
Q.12
True or False: Social Engineering and Malware are usually used for good intents
  • True
  • False
Q.13
Spyware...
  • ...is another word for virus
  • ...is the process of hiring people to find personal information
  • ...involves physically looking at someone typing a password
  • ...sends information away without permission
Q.14
True or false: Computer viruses are most commonly installed by a computer chip
  • True
  • False
Q.15
Blagging...
  • ...means installing a virus into a computer
  • ...is an often-used way to fix computers
  • ...means persisting with a method of social engineering until it succeeds
  • ...means framing as someone reliable or trusted to gain information such as passwords
Q.16
A Trojan...
  • ...is inserted by hackers
  • ...is a virus which misleads users
  • ...is a common way to fight malware
  • Both A & B
Q.17
A worm...
  • ...copies itself using a computer system
  • ...often gains access through security failures on a certain computer
  • ...is inserted into a system when nobody's looking
  • Both A & B
Q.18
Physical Threats...
  • ...occur outside of a computer and are often used to gain personal information
  • ...most commonly occur on social media
  • ...are, most commonly, used to damage a computer
Q.19
Adware...
  • ...is the process of creating an advert
  • ...is the process of hacking into a site through an advert
  • ...means giving possibly harmful adverts to a user
  • ...is the term for any advert
Q.20
True or false: Pharming means misdirecting users to websites to install a virus or gain personal information
  • True
  • False
0 h : 0 m : 1 s